Visible to the public Node Configuration for the Aho-Corasick Algorithm in Intrusion Detection Systems

TitleNode Configuration for the Aho-Corasick Algorithm in Intrusion Detection Systems
Publication TypeConference Paper
Year of Publication2016
AuthorsLacroix, Alexsandre B., Langlois, J.M. Pierre, Boyer, François-Raymond, Gosselin, Antoine, Bois, Guy
Conference NameProceedings of the 2016 Symposium on Architectures for Networking and Communications Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4183-7
KeywordsAho-Corasick algorithm, composability, Computing Theory, deep packet inspection, Deep Packet Inspection (DPI), Intrusion Detection System (IDS), Metrics, node configuration, Pattern matching, pubcrawl, Scalability, security metrics, string matching
Abstract

In this paper, we analyze the performance and cost trade-off from selecting two representations of nodes when implementing the Aho-Corasick algorithm. This algorithm can be used for pattern matching in network-based intrusion detection systems such as Snort. Our analysis uses the Snort 2.9.7 rules set, which contains almost 26k patterns. Our methodology consists of code profiling and analysis, followed by the selection of a parameter to maximize a metric that combines clock cycles count and memory usage. The parameter determines which of two types of nodes is selected for each trie node. We show that it is possible to select the parameter to optimize the metric, which results in an improvement by up to 12x compared with the single node-type case.

URLhttp://doi.acm.org/10.1145/2881025.2889473
DOI10.1145/2881025.2889473
Citation Keylacroix_node_2016